ID

VAR-202004-0934


CVE

CVE-2019-20669


TITLE

plural NETGEAR Cross-site scripting vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2019-015341

DESCRIPTION

Certain NETGEAR devices are affected by stored XSS. This affects RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30. plural NETGEAR A cross-site scripting vulnerability exists in the device.Information may be obtained and tampered with. NETGEAR RBK50 is a wireless router of NETGEAR. The vulnerability stems from the lack of proper verification of client data by WEB applications. Attackers can use this vulnerability to execute client code. This affects RBR20 prior to 2.3.5.26, RBS20 prior to 2.3.5.26, RBK20 prior to 2.3.5.26, RBR40 prior to 2.3.5.30, RBS40 prior to 2.3.5.30, RBK40 prior to 2.3.5.30, RBR50 prior to 2.3.5.30, RBS50 prior to 2.3.5.30, and RBK50 prior to 2.3.5.30

Trust: 2.25

sources: NVD: CVE-2019-20669 // JVNDB: JVNDB-2019-015341 // CNVD: CNVD-2020-24411 // VULMON: CVE-2019-20669

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-24411

AFFECTED PRODUCTS

vendor:netgearmodel:rbr20scope:ltversion:2.3.5.26

Trust: 1.6

vendor:netgearmodel:rbs20scope:ltversion:2.3.5.26

Trust: 1.6

vendor:netgearmodel:rbk20scope:ltversion:2.3.5.26

Trust: 1.6

vendor:netgearmodel:rbr40scope:ltversion:2.3.5.30

Trust: 1.6

vendor:netgearmodel:rbs40scope:ltversion:2.3.5.30

Trust: 1.6

vendor:netgearmodel:rbk40scope:ltversion:2.3.5.30

Trust: 1.6

vendor:netgearmodel:rbr50scope:ltversion:2.3.5.30

Trust: 1.6

vendor:netgearmodel:rbs50scope:ltversion:2.3.5.30

Trust: 1.6

vendor:netgearmodel:rbk50scope:ltversion:2.3.5.30

Trust: 1.6

vendor:netgearmodel:rbk20scope:eqversion:2.3.5.26

Trust: 0.8

vendor:netgearmodel:rbk40scope:eqversion:2.3.5.30

Trust: 0.8

vendor:netgearmodel:rbk50scope:eqversion:2.3.5.30

Trust: 0.8

vendor:netgearmodel:rbr20scope:eqversion:2.3.5.26

Trust: 0.8

vendor:netgearmodel:rbr40scope:eqversion:2.3.5.30

Trust: 0.8

vendor:netgearmodel:rbr50scope:eqversion:2.3.5.30

Trust: 0.8

vendor:netgearmodel:rbs20scope:eqversion:2.3.5.26

Trust: 0.8

vendor:netgearmodel:rbs40scope:eqversion:2.3.5.30

Trust: 0.8

vendor:netgearmodel:rbs50scope:eqversion:2.3.5.30

Trust: 0.8

sources: CNVD: CNVD-2020-24411 // JVNDB: JVNDB-2019-015341 // NVD: CVE-2019-20669

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-20669
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2019-20669
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2019-015341
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-24411
value: LOW

Trust: 0.6

CNNVD: CNNVD-202004-1217
value: MEDIUM

Trust: 0.6

VULMON: CVE-2019-20669
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2019-20669
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2019-015341
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-24411
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-20669
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.7
impactScore: 2.7
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2019-20669
baseSeverity: MEDIUM
baseScore: 6.0
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 5.2
version: 3.0

Trust: 1.0

NVD: JVNDB-2019-015341
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-24411 // VULMON: CVE-2019-20669 // JVNDB: JVNDB-2019-015341 // CNNVD: CNNVD-202004-1217 // NVD: CVE-2019-20669 // NVD: CVE-2019-20669

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2019-015341 // NVD: CVE-2019-20669

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-1217

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202004-1217

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-015341

PATCH

title:Security Advisory for Stored Cross Site Scripting on Some WiFi Systems, PSV-2018-0550url:https://kb.netgear.com/000061470/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0550

Trust: 0.8

title:Patch for Multiple NETGEAR product cross-site scripting vulnerabilities (CNVD-2020-24411)url:https://www.cnvd.org.cn/patchInfo/show/215203

Trust: 0.6

title:Multiple NETGEAR Fixes for product cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116516

Trust: 0.6

sources: CNVD: CNVD-2020-24411 // JVNDB: JVNDB-2019-015341 // CNNVD: CNNVD-202004-1217

EXTERNAL IDS

db:NVDid:CVE-2019-20669

Trust: 3.1

db:JVNDBid:JVNDB-2019-015341

Trust: 0.8

db:CNVDid:CNVD-2020-24411

Trust: 0.6

db:CNNVDid:CNNVD-202004-1217

Trust: 0.6

db:VULMONid:CVE-2019-20669

Trust: 0.1

sources: CNVD: CNVD-2020-24411 // VULMON: CVE-2019-20669 // JVNDB: JVNDB-2019-015341 // CNNVD: CNNVD-202004-1217 // NVD: CVE-2019-20669

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-20669

Trust: 2.0

url:https://kb.netgear.com/000061470/security-advisory-for-stored-cross-site-scripting-on-some-wifi-systems-psv-2018-0550

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-20669

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2020-24411 // VULMON: CVE-2019-20669 // JVNDB: JVNDB-2019-015341 // CNNVD: CNNVD-202004-1217 // NVD: CVE-2019-20669

SOURCES

db:CNVDid:CNVD-2020-24411
db:VULMONid:CVE-2019-20669
db:JVNDBid:JVNDB-2019-015341
db:CNNVDid:CNNVD-202004-1217
db:NVDid:CVE-2019-20669

LAST UPDATE DATE

2024-11-23T22:41:07.121000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-24411date:2020-04-24T00:00:00
db:VULMONid:CVE-2019-20669date:2020-04-20T00:00:00
db:JVNDBid:JVNDB-2019-015341date:2020-05-13T00:00:00
db:CNNVDid:CNNVD-202004-1217date:2020-04-26T00:00:00
db:NVDid:CVE-2019-20669date:2024-11-21T04:39:01.083

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-24411date:2020-04-24T00:00:00
db:VULMONid:CVE-2019-20669date:2020-04-15T00:00:00
db:JVNDBid:JVNDB-2019-015341date:2020-05-13T00:00:00
db:CNNVDid:CNNVD-202004-1217date:2020-04-15T00:00:00
db:NVDid:CVE-2019-20669date:2020-04-15T20:15:13.897